CN113554529A - Anti-electricity-stealing evidence-obtaining key data processing method, device and equipment - Google Patents

Anti-electricity-stealing evidence-obtaining key data processing method, device and equipment Download PDF

Info

Publication number
CN113554529A
CN113554529A CN202111096024.8A CN202111096024A CN113554529A CN 113554529 A CN113554529 A CN 113554529A CN 202111096024 A CN202111096024 A CN 202111096024A CN 113554529 A CN113554529 A CN 113554529A
Authority
CN
China
Prior art keywords
data
electricity
stealing
characteristic information
evidence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111096024.8A
Other languages
Chinese (zh)
Inventor
宋如楠
杨艺宁
薛阳
王聪
杨柳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electric Power Research Institute Co Ltd CEPRI
Original Assignee
China Electric Power Research Institute Co Ltd CEPRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electric Power Research Institute Co Ltd CEPRI filed Critical China Electric Power Research Institute Co Ltd CEPRI
Priority to CN202111096024.8A priority Critical patent/CN113554529A/en
Publication of CN113554529A publication Critical patent/CN113554529A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2291User-Defined Types; Storage management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2465Query processing support for facilitating data mining operations in structured databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Fuzzy Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Probability & Statistics with Applications (AREA)
  • Human Resources & Organizations (AREA)
  • Computational Linguistics (AREA)
  • Water Supply & Treatment (AREA)
  • Public Health (AREA)
  • Storage Device Security (AREA)

Abstract

A method, a device and equipment for processing key data for preventing electricity stealing and evidence obtaining are provided, the method comprises the following steps: acquiring anti-electricity-stealing evidence-obtaining key data, wherein the anti-electricity-stealing evidence-obtaining key data comprises first data and second data, and the first data comprises user profile data; calculating the second data by adopting a Hash algorithm to obtain second characteristic information; and establishing a corresponding relation between the user profile data in the first data and the second characteristic information to obtain an aggregation characteristic information value. By the method, the device and the equipment provided by the embodiment of the invention, the problems of single evidence obtaining type, incomplete evidence and easy tampering and loss of the evidence in the prior art are effectively solved, the integrity, the safety and the traceability of the anti-electricity-stealing evidence are ensured, the problems of obstacles, difficulty and the like in the aspect of judicial authorities identifying the effectiveness of the anti-electricity-stealing evidence are further solved, the officer can be assisted to identify the evidence, the trial period is shortened, and the trial efficiency is improved.

Description

Anti-electricity-stealing evidence-obtaining key data processing method, device and equipment
Technical Field
The invention relates to the technical field of anti-electricity-stealing evidence obtaining, in particular to a method, a device and equipment for processing key data of anti-electricity-stealing evidence obtaining.
Background
The gradual maturity and development of the electric power technology greatly promote the progress of various industries in the society, and the difficulty of power utilization management is increased. The electricity acquisition technology is continuously developed, the electricity stealing behavior of the user also has the development trend of diversification, science and technology and concealment, the development of electric power enterprises in China is seriously damaged, and the ordered competition of the market and the social power supply order are broken. Because the electric energy is intangible asset, the problems of difficult electricity stealing and evidence obtaining, difficult evidence storing, low judicial information collection rate and the like exist in the work of electricity stealing and investigation, so the research significance of the credible evidence obtaining technology for preventing electricity stealing is great.
When credible evidence obtaining of electricity stealing prevention is carried out, at present, a mobile phone or a camera is used for shooting on site generally, the shot video or picture is directly stored locally as data for judging electricity stealing behavior, evidence integrity and tamper resistance cannot be guaranteed, and a plurality of factors can cause difficulty in subsequent electricity stealing treatment and evidence obtaining work, including that image data is easy to damage by electricity stealing molecules in the shooting process and after shooting, storage equipment is damaged and lost, and the like, and key data of evidence obtaining of electricity stealing prevention cannot be recorded in real time. In addition, the data of the basis of judging the electricity stealing behavior such as the video or the photo collected at present can not ensure the integrity of the evidence and can not be falsified, and the obstacle and the difficulty still exist in the aspect that the judicial authority determines the effectiveness of the evidence.
Disclosure of Invention
In view of this, the invention provides a method, a device and equipment for processing key data for anti-electricity-stealing evidence obtaining, and aims to solve the problems of incomplete evidence and easy data tampering in the anti-electricity-stealing evidence obtaining process in the related art.
In a first aspect, an embodiment of the present invention provides a method for processing critical data for anti-electricity-stealing evidence obtaining, including: acquiring anti-electricity-stealing evidence-obtaining key data, wherein the anti-electricity-stealing evidence-obtaining key data comprises first data and second data, and the first data comprises user profile data; calculating the second data by adopting a Hash algorithm to obtain second characteristic information; and establishing a corresponding relation between the user profile data in the first data and the second characteristic information to obtain an aggregation characteristic information value.
Further, the anti-electricity-stealing evidence-obtaining key data further includes third data, and before the second data is calculated by using a hash algorithm to obtain second characteristic information, the method further includes: and superposing the third data in the second data in an image watermark mode to obtain superposed second data.
Further, the calculating the second data by using a hash algorithm to obtain second feature information includes: judging whether the byte number of the second data is smaller than a preset sampling calculation threshold value: if so, calculating the second data by adopting a Hash algorithm to obtain second characteristic information; and if not, sampling the second data by adopting a first sampling rule to obtain a plurality of sampling values, calculating each sampling value by adopting a Hash algorithm, and combining each calculation result according to a first combination rule to obtain second characteristic information.
Further, the sampling the second data by using the first sampling rule to obtain a plurality of sampling values includes: and acquiring the head n bytes of the second data, the head n bytes and the tail n bytes of the second data after the position of the integral multiple of the byte number of each preset sampling calculation interval is taken as a sampling value.
Further, before the establishing of the corresponding relationship between the user profile data in the first data and the second feature information, the method further includes: and calculating the first data by adopting a first algorithm to obtain first characteristic information.
Further, the calculating the first data by using the first algorithm to obtain the first feature information includes: and calculating the first data by using the encryption chip ID as a secret key based on an encryption chip and adopting a state secret algorithm to obtain first characteristic information.
Further, establishing a corresponding relationship between the user profile data in the first data and the second feature information to obtain an aggregated feature information value, including: and extracting the user profile data in the first characteristic information as Key, and establishing a Key-Value corresponding relation as an aggregated characteristic information Value by taking the second characteristic information as Value.
Further, before the establishing of the corresponding relationship between the user profile data in the first data and the second feature information, the method further includes: and formatting the first characteristic information and the second characteristic information.
Further, the first data further comprises electricity inspection personnel data.
Further, the second data includes: the system comprises anti-electricity-stealing field video data and anti-electricity-stealing field audio data, wherein the anti-electricity-stealing field video data and the anti-electricity-stealing field audio data are acquired by a video acquisition module and an audio acquisition module respectively in real time.
Further, the third data includes: forensic time data and forensic location data.
In a second aspect, an embodiment of the present invention further provides an apparatus for processing critical data for anti-electricity-stealing and evidence-obtaining, including: the key data acquisition unit is used for acquiring anti-electricity-stealing evidence-obtaining key data, wherein the anti-electricity-stealing evidence-obtaining key data comprise first data and second data, and the first data comprise user profile data; the second characteristic information calculating unit is used for calculating the second data by adopting a Hash algorithm to obtain second characteristic information; and the aggregation characteristic information calculation unit is used for establishing a corresponding relation between the user profile data in the first data and the second characteristic information to obtain an aggregation characteristic information value.
Further, the key data for preventing electricity stealing and evidence obtaining further comprises third data, and the device further comprises: and the data superposition unit is used for superposing third data in the second data in an image watermark mode to obtain superposed second data.
Further, the second feature information calculating unit is further configured to: judging whether the byte number of the second data is smaller than a preset sampling calculation threshold value: if so, calculating the second data by adopting a Hash algorithm to obtain second characteristic information; and if not, sampling the second data by adopting a first sampling rule to obtain a plurality of sampling values, calculating each sampling value by adopting a Hash algorithm, and combining each calculation result according to a first combination rule to obtain second characteristic information.
Further, the sampling the second data by using the first sampling rule to obtain a plurality of sampling values includes: and acquiring the head n bytes of the second data, the head n bytes and the tail n bytes of the second data after the position of the integral multiple of the byte number of each preset sampling calculation interval is taken as a sampling value.
Further, the apparatus further comprises: and the first characteristic information calculating unit is used for calculating the first data by adopting a first algorithm to obtain first characteristic information before the corresponding relation between the user profile data in the first data and the second characteristic information is established.
Further, the calculating the first data by using the first algorithm to obtain the first feature information includes: and calculating the first data by using the encryption chip ID as a secret key based on an encryption chip and adopting a state secret algorithm to obtain first characteristic information.
Further, the aggregate characteristic information calculation unit is further configured to: and extracting the user profile data in the first characteristic information as Key, and establishing a Key-Value corresponding relation as an aggregated characteristic information Value by taking the second characteristic information as Value.
Further, the apparatus further comprises: and the formatting processing unit is used for formatting the first characteristic information and the second characteristic information.
Further, the first data further comprises electricity inspection personnel data.
Further, the second data includes: the system comprises anti-electricity-stealing field video data and anti-electricity-stealing field audio data, wherein the anti-electricity-stealing field video data and the anti-electricity-stealing field audio data are acquired by a video acquisition module and an audio acquisition module respectively in real time.
Further, the third data includes: forensic time data and forensic location data.
In a third aspect, an embodiment of the present invention further provides an anti-electricity-stealing evidence-obtaining key data processing device, where the device includes: the video acquisition module is used for acquiring the video data of the electricity stealing prevention field in real time and sending the video data of the electricity stealing prevention field to the processor; the audio acquisition module is used for acquiring the audio data of the electricity stealing prevention field in real time and sending the audio data of the electricity stealing prevention field to the processor; the positioning time service module is used for acquiring anti-electricity-stealing evidence-obtaining position information and anti-electricity-stealing evidence-obtaining time in real time and sending the anti-electricity-stealing evidence-obtaining position information and the anti-electricity-stealing evidence-obtaining time to the processor; and the processor is used for receiving the video data of the electricity stealing preventing field, the audio data of the electricity generating field, the evidence obtaining position information of the electricity stealing preventing and the evidence obtaining time of the electricity stealing, and executing the method provided by each embodiment of the invention.
According to the method, the device and the equipment for processing the key data for preventing electricity stealing and obtaining evidence, the second characteristic information is obtained by calculating the second data in the key data for preventing electricity stealing and obtaining evidence (namely the electricity stealing evidence) by adopting the Hash algorithm, the problems that the electricity stealing evidence is incomplete and the evidence is easy to tamper and lose in the prior art are effectively solved, the integrity, the safety and the traceability of the electricity stealing evidence are ensured, the problems that a judicial authority has obstacles and difficulty in confirming the effectiveness of the electricity stealing evidence are solved, the evidence confirmation by a judge can be assisted, the trial period is shortened, and the trial efficiency is improved. Meanwhile, the Hash code has uniqueness, so that the uniqueness of the anti-electricity-stealing evidence is ensured; in addition, the hash algorithm reduces the requirement on the data storage environment, improves the data storage capacity and the storage efficiency, and can realize light weight and convenience of data operation.
According to the method, the device and the equipment for processing the key data for preventing electricity stealing and evidence obtaining provided by some embodiments of the invention, the key data for preventing electricity stealing and evidence obtaining (namely the evidence for preventing electricity stealing) comprises user file data, electricity utilization inspector data, field audio and video data, evidence obtaining time data and evidence obtaining position data, so that the problem of single evidence obtaining type in the prior art is solved, and the integrity of evidence is improved.
According to the method, the device and the equipment for processing the key data for preventing electricity stealing and obtaining evidence, which are provided by the embodiments of the invention, the evidence obtaining time data and the evidence obtaining position data are superposed in the field audio and video data in an image watermarking manner, so that the integrity of the evidence is further ensured, and a foundation is laid for the verification of the integrity of the evidence and the evidence obtaining and obtaining time of evidence in the subsequent judicial part.
Drawings
FIG. 1 illustrates an exemplary flow diagram of a method of anti-electricity-stealing forensic critical data processing according to an embodiment of the present invention;
fig. 2 shows a schematic structural diagram of an anti-electricity-stealing evidence-obtaining key data processing device according to an embodiment of the invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, the same units/elements are denoted by the same reference numerals.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
Fig. 1 shows an exemplary flow diagram of a method of anti-electricity-stealing forensic critical data processing according to an embodiment of the present invention.
As shown in fig. 1, the method includes:
step S101: obtaining anti-electricity-stealing evidence-obtaining key data, wherein the anti-electricity-stealing evidence-obtaining key data comprise first data and second data, and the first data comprise user profile data.
In the embodiment of the invention, the key data for obtaining evidence of electricity stealing is the evidence of electricity stealing, wherein the first data can comprise user file data and electricity utilization inspection personnel data, and the second data can comprise video data of an electricity stealing preventing field acquired by a video acquisition module in real time and audio data of the electricity stealing preventing field acquired by an audio acquisition module in real time. Specifically, the user profile data comprises user electricity meter codes, and each user has a unique electricity meter code; the electricity inspection personnel data comprises electricity inspection personnel identity data, and each electricity inspection personnel has unique identity data.
Further, the first data further includes electricity inspection person data.
Further, the second data includes: the video data and the audio data of the electricity stealing prevention site are acquired by the video acquisition module and the audio acquisition module respectively in real time.
In the above embodiment, the electricity-stealing prevention evidence-obtaining key data may include text data such as user profile data and electricity utilization inspector data, and may also include electricity-stealing prevention field audio data and video data, and by acquiring various types of data, the problem of single evidence-obtaining type in the prior art is solved.
Step S102: and calculating the second data by adopting a Hash algorithm to obtain second characteristic information.
The Hash algorithm is characterized in that the Hash algorithm is a one-way algorithm, a unique Hash value with a certain length can be generated for target information through the Hash algorithm, namely a unique 'fingerprint', but the target information cannot be obtained again through the Hash value, so that the second data has uniqueness, non-tampering property and traceability, tampering and loss of anti-electricity-stealing evidences are avoided, the uniqueness, integrity, safety and traceability of the anti-electricity-stealing evidences are ensured, the problems of obstacles, difficulty and the like in the aspect of identifying the effectiveness of the evidences by a judicial authority are solved, and a data basis is provided for storing the data in a block chain and forming a trusted archive in the future. Meanwhile, compared with the traditional method for processing consumed resources, the Hash coding technology is adopted as an anti-electricity-stealing evidence storage and safety strategy, the requirement on a data storage environment is reduced, the data storage capacity and the storage efficiency are improved, and light weight and convenience in data operation are realized.
Further, step S102 includes:
judging whether the byte number of the second data is smaller than a preset sampling calculation threshold value:
if so, calculating the second data by adopting a Hash algorithm to obtain second characteristic information;
if not, sampling the second data by adopting the first sampling rule to obtain a plurality of sampling values, respectively calculating each sampling value by adopting a Hash algorithm, and combining each calculation result according to the first combination rule to obtain second characteristic information.
In the embodiment of the invention, when the byte number of the second data is smaller than the preset sampling calculation threshold, the hash algorithm is directly adopted to calculate the second data, otherwise, the second data is sampled, and only the sampling values are respectively calculated by the hash algorithm. The first sampling rule and the first merging rule may set different modes according to requirements, for example, the second data may be equally divided into a plurality of segments from a head of the second data by taking m bytes as a unit, each segment takes n first bytes as a sampling value, a hash algorithm is adopted to calculate each sampling value to obtain a hash value of each sampling value, each hash value is merged according to a sampling sequence from the head to a tail to obtain second feature information, where m and n are positive integers; the second data may also be equally divided into a plurality of segments by taking m bytes as a unit from the tail of the second data, taking n bytes after each segment as a sampling value, respectively calculating each sampling value by adopting a hash algorithm to obtain a hash value of each sampling value, and combining each hash value according to a sampling sequence from the tail to the head to obtain the second characteristic information, wherein m and n are positive integers.
In the above embodiment, the second data with a large number of bytes (i.e., occupying a large storage space) is segmented and sampled and then subjected to hash coding, so that the overall integrity of the second data can be ensured, and the data amount processed by the hash algorithm can be greatly reduced, thereby ensuring the data processing speed.
Further, sampling the second data by using the first sampling rule to obtain a plurality of sampling values, including:
and acquiring the head n bytes of the second data, and the head n bytes and the tail n bytes of the second data after the integral multiple number position of the byte number of each preset sampling calculation interval is taken as sampling values.
In the embodiment of the invention, the second data can be divided into a plurality of sections by taking the number of bytes at the preset sampling calculation interval as a dividing unit, and for each section of data, the first n bytes of the data are taken as sampling values by each section of data except that the tail data are taken as sampling values by acquiring the tail n bytes; and calculating each sampling value by adopting a Hash algorithm to obtain a corresponding Hash value, and sequentially combining each Hash value according to the sequence from the head to the tail to obtain second characteristic information, wherein n is a positive integer. In particular, n may be 64K.
Step S103: and establishing a corresponding relation between the user profile data in the first data and the second characteristic information to obtain an aggregation characteristic information value.
In the embodiment of the invention, by establishing the corresponding relation between the user profile data in the first data and the second characteristic information, classification and relevance storage of the electricity stealing prevention data can be realized, data redundancy is reduced, and query and calling of evidence are facilitated.
Further, the key data for obtaining evidence against electricity stealing further includes third data, and before step S102, the method further includes: and superposing the third data in the second data in an image watermark mode to obtain superposed second data.
Further, the third data includes: forensic time data and forensic location data.
The evidence obtaining time data and the evidence obtaining position data can be acquired by the positioning time service module in real time.
Specifically, the evidence obtaining time data and the evidence obtaining position data are superposed in the video data of the electricity stealing prevention field and the audio data of the electricity stealing prevention field in an image watermarking mode to obtain the superposed video data of the electricity stealing prevention field and the superposed audio data of the electricity stealing prevention field. And obtaining second characteristic information by using a Hash algorithm to the superposed video data and audio data of the electricity stealing prevention field.
According to the embodiment, the evidence obtaining time data and the evidence obtaining position data are overlapped, so that the detailed time record and position record of the anti-electricity-stealing field video data and the anti-electricity-stealing field audio data at each moment are guaranteed, the overlapped anti-electricity-stealing field video data and the overlapped anti-electricity-stealing field audio data are subjected to hash coding, the types of the anti-electricity-stealing evidences are enriched, and meanwhile, the data are not easy to be tampered, and the uniqueness and the integrity of the data can be guaranteed from the source.
Further, before step S103, the method further includes:
and calculating the first data by adopting a first algorithm to obtain first characteristic information.
The first algorithm can be any encryption algorithm, and the first data is calculated through the first algorithm, so that the safety of the first data is enhanced.
Further, calculating the first data by using a first algorithm to obtain first feature information, including:
based on the encryption chip, a state cryptographic algorithm is adopted, the ID of the encryption chip is used as a secret key, and the first data is calculated to obtain first characteristic information.
In the embodiment of the invention, the encryption chip can be an ESAM chip, and the cryptographic algorithm can be an SM1 algorithm. Based on the built-in ESAM chip, an SM1 algorithm is adopted, the ID of the ESAM chip is used as a key, a first data ciphertext is obtained through calculation, and the first data ciphertext is used as first characteristic information.
Further, step S103 includes:
and extracting the user file data in the first characteristic information as Key, and establishing a Key-Value corresponding relation as an aggregated characteristic information Value by taking the second characteristic information as Value.
By establishing a Key-Value corresponding relation, classification and relevance storage of the electricity stealing prevention data can be further realized, data redundancy is reduced, and storage and query of super-large-scale data are facilitated.
Further, before step S103, the method further includes:
and formatting the first characteristic information and the second characteristic information.
In the embodiment of the present invention, the formatting process may be to encapsulate the combined feature information in different formats, such as JSON format, XML format, and YAML format. Specifically, the first feature information and the second feature information may be encapsulated into a formatted feature string in JSON format. In a specific format sample, cust _ no represents user number characteristic information, day _ read represents the characteristic information of the electric energy indicating value frozen by the user on the day, code-user represents power consumption inspector data, and an array contained in video represents the file name and the characteristic information of the audio and video data of each segmented site. Through the data formatting process, data management and transmission are facilitated.
Fig. 2 shows a schematic structural diagram of an anti-electricity-stealing evidence-obtaining key data processing device according to an embodiment of the invention.
As shown in fig. 2, the apparatus includes:
the key data acquisition unit 201 is configured to acquire electricity-stealing-prevention evidence-obtaining key data, where the electricity-stealing-prevention evidence-obtaining key data includes first data and second data, and the first data includes user profile data.
In the embodiment of the invention, the key data for obtaining evidence of electricity stealing is the evidence of electricity stealing, wherein the first data can comprise user file data and electricity utilization inspection personnel data, and the second data can comprise video data of an electricity stealing preventing field acquired by a video acquisition module in real time and audio data of the electricity stealing preventing field acquired by an audio acquisition module in real time. Specifically, the user profile data comprises user electricity meter codes, and each user has a unique electricity meter code; the electricity inspection personnel data comprises electricity inspection personnel identity data, and each electricity inspection personnel has unique identity data.
Further, the first data further includes electricity inspection person data.
Further, the second data includes: the video data and the audio data of the electricity stealing prevention site are acquired by the video acquisition module and the audio acquisition module respectively in real time.
In the above embodiment, the electricity-stealing prevention evidence-obtaining key data may include text data such as user profile data and electricity utilization inspector data, and may also include electricity-stealing prevention field audio data and video data, and by acquiring various types of data, the problem of single evidence-obtaining type in the prior art is solved.
The second characteristic information calculating unit 202 is configured to calculate the second data by using a hash algorithm to obtain second characteristic information.
The Hash algorithm is characterized in that the Hash algorithm is a one-way algorithm, a unique Hash value with a certain length can be generated for target information through the Hash algorithm, namely a unique 'fingerprint', but the target information cannot be obtained again through the Hash value, so that the second data has uniqueness, non-tampering property and traceability, tampering and loss of anti-electricity-stealing evidences are avoided, the uniqueness, integrity, safety and traceability of the anti-electricity-stealing evidences are ensured, the problems of obstacles, difficulty and the like in the aspect of identifying the effectiveness of the evidences by a judicial authority are solved, and a data basis is provided for storing the data in a block chain and forming a trusted archive in the future. Meanwhile, compared with the traditional method for processing consumed resources, the Hash coding technology is adopted as an anti-electricity-stealing evidence storage and safety strategy, the requirement on a data storage environment is reduced, the data storage capacity and the storage efficiency are improved, and light weight and convenience in data operation are realized.
Further, the second feature information calculating unit 202 is further configured to:
judging whether the byte number of the second data is smaller than a preset sampling calculation threshold value:
if so, calculating the second data by adopting a Hash algorithm to obtain second characteristic information;
if not, sampling the second data by adopting the first sampling rule to obtain a plurality of sampling values, respectively calculating each sampling value by adopting a Hash algorithm, and combining each calculation result according to the first combination rule to obtain second characteristic information.
In the embodiment of the invention, when the byte number of the second data is smaller than the preset sampling calculation threshold, the hash algorithm is directly adopted to calculate the second data, otherwise, the second data is sampled, and only the sampling values are respectively calculated by the hash algorithm. The first sampling rule and the first merging rule may set different modes according to requirements, for example, the second data may be equally divided into a plurality of segments from a head of the second data by taking m bytes as a unit, each segment takes n first bytes as a sampling value, a hash algorithm is adopted to calculate each sampling value to obtain a hash value of each sampling value, each hash value is merged according to a sampling sequence from the head to a tail to obtain second feature information, where m and n are positive integers; the second data may also be equally divided into a plurality of segments by taking m bytes as a unit from the tail of the second data, taking n bytes after each segment as a sampling value, respectively calculating each sampling value by adopting a hash algorithm to obtain a hash value of each sampling value, and combining each hash value according to a sampling sequence from the tail to the head to obtain the second characteristic information, wherein m and n are positive integers.
In the above embodiment, the second data with a large number of bytes (i.e., occupying a large storage space) is segmented and sampled and then subjected to hash coding, so that the overall integrity of the second data can be ensured, and the data amount processed by the hash algorithm can be greatly reduced, thereby ensuring the data processing speed.
Further, sampling the second data by using the first sampling rule to obtain a plurality of sampling values, including:
and acquiring the head n bytes of the second data, and the head n bytes and the tail n bytes of the second data after the integral multiple number position of the byte number of each preset sampling calculation interval is taken as sampling values.
In the embodiment of the invention, the second data can be divided into a plurality of sections by taking the number of bytes at the preset sampling calculation interval as a dividing unit, and for each section of data, the first n bytes of the data are taken as sampling values by each section of data except that the tail data are taken as sampling values by acquiring the tail n bytes; and calculating each sampling value by adopting a Hash algorithm to obtain a corresponding Hash value, and sequentially combining each Hash value according to the sequence from the head to the tail to obtain second characteristic information, wherein n is a positive integer. In particular, n may be 64K.
The aggregation characteristic information calculating unit 203 is configured to establish a corresponding relationship between the user profile data in the first data and the second characteristic information, so as to obtain an aggregation characteristic information value.
In the embodiment of the invention, by establishing the corresponding relation between the user profile data in the first data and the second characteristic information, classification and relevance storage of the electricity stealing prevention data can be realized, data redundancy is reduced, and query and calling of evidence are facilitated.
Further, the key data for obtaining evidence by preventing electricity stealing also comprises third data, and the device also comprises:
and the data superposition unit is used for superposing the third data in the second data in an image watermark mode to obtain superposed second data.
Further, the third data includes: forensic time data and forensic location data.
The evidence obtaining time data and the evidence obtaining position data can be acquired by the positioning time service module in real time.
Specifically, the evidence obtaining time data and the evidence obtaining position data are superposed in the field video data and the field audio data in an image watermarking mode to obtain the superposed field video data and the superposed field audio data. And obtaining second characteristic information by using a Hash algorithm for the superposed field video data and the superposed field audio data.
According to the embodiment, the evidence obtaining time data and the evidence obtaining position data are overlapped, so that detailed time record and position record of the field video data and the field audio data at each moment are guaranteed, the overlapped field video data and the overlapped field audio data are subjected to Hash coding, the types of the electricity stealing prevention evidences are enriched, and meanwhile, the data are not easy to be tampered and the uniqueness and the integrity of the data can be guaranteed from the source.
Further, the apparatus further comprises:
and the first characteristic information calculating unit is used for calculating the first data by adopting a first algorithm to obtain first characteristic information before establishing the corresponding relation between the user profile data and the second characteristic information in the first data.
The first algorithm can be any encryption algorithm, and the first data is calculated through the first algorithm, so that the safety of the first data is enhanced.
Further, calculating the first data by using a first algorithm to obtain first feature information, including:
based on the encryption chip, a state cryptographic algorithm is adopted, the ID of the encryption chip is used as a secret key, and the first data is calculated to obtain first characteristic information.
In the embodiment of the invention, the encryption chip can be an ESAM chip, and the cryptographic algorithm can be an SM1 algorithm. Based on the built-in ESAM chip, an SM1 algorithm is adopted, the ID of the ESAM chip is used as a key, a first data ciphertext is obtained through calculation, and the first data ciphertext is used as first characteristic information.
Further, the aggregate characteristic information calculating unit 203 is further configured to:
and extracting the user file data in the first characteristic information as Key, and establishing a Key-Value corresponding relation as an aggregated characteristic information Value by taking the second characteristic information as Value.
By establishing a Key-Value corresponding relation, classification and relevance storage of the electricity stealing prevention data can be further realized, data redundancy is reduced, and storage and query of super-large-scale data are facilitated.
Further, the apparatus further comprises:
and the formatting processing unit is used for carrying out formatting processing on the first characteristic information and the second characteristic information.
In the embodiment of the present invention, the formatting process may be to encapsulate the combined feature information in different formats, such as JSON format, XML format, and YAML format. Specifically, the first feature information and the second feature information may be encapsulated into a formatted feature string in JSON format. In a specific format sample, cust _ no represents user number characteristic information, day _ read represents the characteristic information of the electric energy indicating value frozen by the user on the day, code-user represents power consumption inspector data, and an array contained in video represents the file name and the characteristic information of the audio and video data of each segmented site. Through the data formatting process, data management and transmission are facilitated.
The invention also provides a key data processing device for obtaining evidence against electricity stealing, which comprises:
the video acquisition module is used for acquiring the video data of the electricity stealing prevention field in real time and sending the video data of the electricity stealing prevention field to the processor;
the audio acquisition module is used for acquiring the audio data of the electricity stealing prevention field in real time and sending the audio data of the electricity stealing prevention field to the processor;
the positioning time service module is used for acquiring anti-electricity-stealing evidence-obtaining position information and anti-electricity-stealing evidence-obtaining time in real time and sending the anti-electricity-stealing evidence-obtaining position information and the anti-electricity-stealing evidence-obtaining time to the processor;
and the processor is used for receiving the video data of the electricity stealing prevention site, the audio data of the electricity generation site, the evidence obtaining position information of the electricity stealing prevention and the evidence obtaining time of the electricity stealing prevention, and executing any one of the key data processing methods for the electricity stealing prevention and evidence obtaining.
In the embodiment of the invention, the positioning time service module can be a Beidou positioning time service module. Superposing the anti-electricity-stealing evidence-obtaining time data and the anti-electricity-stealing evidence-obtaining position data in the anti-electricity-stealing field video data and the anti-electricity-stealing field audio data in an image watermark mode to obtain superposed anti-electricity-stealing field video data and anti-electricity-stealing field audio data; calculating the superposed video data and audio data of the electricity stealing prevention field by adopting a Hash algorithm to obtain second characteristic information, and then establishing a corresponding relation between user file data and the second characteristic information in the first data; through carrying out hash coding to the on-the-spot video data of anti-electricity-stealing and the on-the-spot audio data of anti-electricity-stealing after the stack, both richened the type of anti-electricity-stealing evidence, can guarantee simultaneously from the source that data is difficult to be falsely makeed and uniqueness and the integrality of data, and then solved the judicial officer and confirmed that there are obstacle and degree of difficulty scheduling problem in the effective aspect of anti-electricity-stealing evidence, can assist the judge to carry out evidence affirmation, shorten the trial cycle, improve the judgement efficiency.
The invention has been described with reference to a few embodiments. However, other embodiments of the invention than the one disclosed above are equally possible within the scope of the invention, as would be apparent to a person skilled in the art from the appended patent claims.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the [ device, component, etc ]" are to be interpreted openly as referring to at least one instance of said device, component, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.

Claims (23)

1. A key data processing method for obtaining evidence by preventing electricity stealing is characterized by comprising the following steps:
acquiring anti-electricity-stealing evidence-obtaining key data, wherein the anti-electricity-stealing evidence-obtaining key data comprises first data and second data, and the first data comprises user profile data;
calculating the second data by adopting a Hash algorithm to obtain second characteristic information;
and establishing a corresponding relation between the user profile data in the first data and the second characteristic information to obtain an aggregation characteristic information value.
2. The method according to claim 1, wherein the electricity stealing prevention evidence obtaining key data further includes third data, and before the calculating the second data by using the hash algorithm to obtain the second characteristic information, the method further includes:
and superposing the third data in the second data in an image watermark mode to obtain superposed second data.
3. The method of claim 1, wherein the computing the second data by using a hash algorithm to obtain second feature information comprises:
judging whether the byte number of the second data is smaller than a preset sampling calculation threshold value:
if so, calculating the second data by adopting a Hash algorithm to obtain second characteristic information;
and if not, sampling the second data by adopting a first sampling rule to obtain a plurality of sampling values, calculating each sampling value by adopting a Hash algorithm, and combining each calculation result according to a first combination rule to obtain second characteristic information.
4. The method of claim 3, wherein sampling the second data using the first sampling rule to obtain a plurality of sample values comprises:
and acquiring the head n bytes of the second data, the head n bytes and the tail n bytes of the second data after the position of the integral multiple of the byte number of each preset sampling calculation interval is taken as a sampling value.
5. The method according to claim 1, wherein before establishing the correspondence between the user profile data in the first data and the second feature information, the method further comprises:
and calculating the first data by adopting a first algorithm to obtain first characteristic information.
6. The method of claim 5, wherein the calculating the first data using the first algorithm to obtain the first feature information comprises:
and calculating the first data by using the encryption chip ID as a secret key based on an encryption chip and adopting a state secret algorithm to obtain first characteristic information.
7. The method according to claim 5, wherein the establishing a corresponding relationship between the user profile data in the first data and the second feature information to obtain an aggregated feature information value comprises:
and extracting the user profile data in the first characteristic information as Key, and establishing a Key-Value corresponding relation as an aggregated characteristic information Value by taking the second characteristic information as Value.
8. The method according to claim 5, wherein before establishing the corresponding relationship between the user profile data in the first data and the second feature information, the method further comprises:
and formatting the first characteristic information and the second characteristic information.
9. The method of any of claims 1-8, wherein the first data further comprises electricity inspection personnel data.
10. The method of any of claims 1-8, wherein the second data comprises: the system comprises anti-electricity-stealing field video data and anti-electricity-stealing field audio data, wherein the anti-electricity-stealing field video data and the anti-electricity-stealing field audio data are acquired by a video acquisition module and an audio acquisition module respectively in real time.
11. The method of claim 2, wherein the third data comprises: forensic time data and forensic location data.
12. An anti-electricity-stealing evidence-obtaining key data processing device, characterized in that the device comprises:
the key data acquisition unit is used for acquiring anti-electricity-stealing evidence-obtaining key data, wherein the anti-electricity-stealing evidence-obtaining key data comprise first data and second data, and the first data comprise user profile data;
the second characteristic information calculating unit is used for calculating the second data by adopting a Hash algorithm to obtain second characteristic information;
and the aggregation characteristic information calculation unit is used for establishing a corresponding relation between the user profile data in the first data and the second characteristic information to obtain an aggregation characteristic information value.
13. The apparatus of claim 12, wherein the electricity stealing prevention forensics critical data further comprises third data, the apparatus further comprising:
and the data superposition unit is used for superposing third data in the second data in an image watermark mode to obtain superposed second data.
14. The apparatus of claim 12, wherein the second feature information calculating unit is further configured to:
judging whether the byte number of the second data is smaller than a preset sampling calculation threshold value:
if so, calculating the second data by adopting a Hash algorithm to obtain second characteristic information;
and if not, sampling the second data by adopting a first sampling rule to obtain a plurality of sampling values, calculating each sampling value by adopting a Hash algorithm, and combining each calculation result according to a first combination rule to obtain second characteristic information.
15. The apparatus of claim 14, wherein the sampling the second data using the first sampling rule to obtain a plurality of sample values comprises:
and acquiring the head n bytes of the second data, the head n bytes and the tail n bytes of the second data after the position of the integral multiple of the byte number of each preset sampling calculation interval is taken as a sampling value.
16. The apparatus of claim 12, further comprising:
and the first characteristic information calculating unit is used for calculating the first data by adopting a first algorithm to obtain first characteristic information before the corresponding relation between the user profile data in the first data and the second characteristic information is established.
17. The apparatus of claim 16, wherein the calculating the first data using the first algorithm to obtain the first feature information comprises:
and calculating the first data by using the encryption chip ID as a secret key based on an encryption chip and adopting a state secret algorithm to obtain first characteristic information.
18. The apparatus of claim 16, wherein the aggregate feature information calculating unit is further configured to:
and extracting the user profile data in the first characteristic information as Key, and establishing a Key-Value corresponding relation as an aggregated characteristic information Value by taking the second characteristic information as Value.
19. The apparatus of claim 16, further comprising:
and the formatting processing unit is used for formatting the first characteristic information and the second characteristic information.
20. The apparatus of any of claims 12-19, wherein the first data further comprises electricity inspection personnel data.
21. The apparatus of any of claims 12-19, wherein the second data comprises: the system comprises anti-electricity-stealing field video data and anti-electricity-stealing field audio data, wherein the anti-electricity-stealing field video data and the anti-electricity-stealing field audio data are acquired by a video acquisition module and an audio acquisition module respectively in real time.
22. The apparatus of claim 13, wherein the third data comprises: forensic time data and forensic location data.
23. An anti-electricity-stealing evidence-obtaining critical data processing apparatus, the apparatus comprising:
the video acquisition module is used for acquiring the video data of the electricity stealing prevention field in real time and sending the video data of the electricity stealing prevention field to the processor;
the audio acquisition module is used for acquiring the audio data of the electricity stealing prevention field in real time and sending the audio data of the electricity stealing prevention field to the processor;
the positioning time service module is used for acquiring anti-electricity-stealing evidence-obtaining position information and anti-electricity-stealing evidence-obtaining time in real time and sending the anti-electricity-stealing evidence-obtaining position information and the anti-electricity-stealing evidence-obtaining time to the processor;
a processor for receiving the electricity stealing field video data, the electricity stealing field audio data, electricity stealing evidence obtaining location information and the electricity stealing evidence obtaining time, and performing the method of claim 10 or 11.
CN202111096024.8A 2021-09-18 2021-09-18 Anti-electricity-stealing evidence-obtaining key data processing method, device and equipment Pending CN113554529A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111096024.8A CN113554529A (en) 2021-09-18 2021-09-18 Anti-electricity-stealing evidence-obtaining key data processing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111096024.8A CN113554529A (en) 2021-09-18 2021-09-18 Anti-electricity-stealing evidence-obtaining key data processing method, device and equipment

Publications (1)

Publication Number Publication Date
CN113554529A true CN113554529A (en) 2021-10-26

Family

ID=78134681

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111096024.8A Pending CN113554529A (en) 2021-09-18 2021-09-18 Anti-electricity-stealing evidence-obtaining key data processing method, device and equipment

Country Status (1)

Country Link
CN (1) CN113554529A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114416753A (en) * 2022-04-01 2022-04-29 国网山东省电力公司营销服务中心(计量中心) Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101616181A (en) * 2009-07-27 2009-12-30 腾讯科技(深圳)有限公司 A kind of method, system and equipment of uploading with the downloaded subtitle file
CN109819101A (en) * 2018-12-18 2019-05-28 法信公证云(厦门)科技有限公司 A kind of evidence collecting method and Specialised mobile terminal of collecting evidence
CN110264015A (en) * 2019-06-28 2019-09-20 国网河南省电力公司电力科学研究院 It opposes electricity-stealing and checks monitoring method and platform
CN110348813A (en) * 2019-07-16 2019-10-18 国网天津市电力公司 Operation application method is moved in on-site examination
CN112562271A (en) * 2020-11-29 2021-03-26 北京市安全生产科学技术研究院 Comprehensive data acquisition evidence obtaining equipment for accident scene
CN113114956A (en) * 2021-03-18 2021-07-13 深圳市博实结科技有限公司 Method and device for video information superposition

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101616181A (en) * 2009-07-27 2009-12-30 腾讯科技(深圳)有限公司 A kind of method, system and equipment of uploading with the downloaded subtitle file
CN109819101A (en) * 2018-12-18 2019-05-28 法信公证云(厦门)科技有限公司 A kind of evidence collecting method and Specialised mobile terminal of collecting evidence
CN110264015A (en) * 2019-06-28 2019-09-20 国网河南省电力公司电力科学研究院 It opposes electricity-stealing and checks monitoring method and platform
CN110348813A (en) * 2019-07-16 2019-10-18 国网天津市电力公司 Operation application method is moved in on-site examination
CN112562271A (en) * 2020-11-29 2021-03-26 北京市安全生产科学技术研究院 Comprehensive data acquisition evidence obtaining equipment for accident scene
CN113114956A (en) * 2021-03-18 2021-07-13 深圳市博实结科技有限公司 Method and device for video information superposition

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114416753A (en) * 2022-04-01 2022-04-29 国网山东省电力公司营销服务中心(计量中心) Electricity stealing evidence data processing method and system based on space-time vector four-dimensional data

Similar Documents

Publication Publication Date Title
CN110958319B (en) Method and device for managing infringement and evidence-based block chain
CN111027028A (en) Copyright data processing method and device based on intelligent contract
CN110474962B (en) Data checking system and method based on edge calculation
CN112270550A (en) New energy electric power source tracing method and system based on block chain
CN110995673A (en) Case evidence management method and device based on block chain, terminal and storage medium
CN112000928A (en) Picture distributed infringement right confirming method, system, storage medium and computer equipment
CN115270193B (en) Data file secure sharing method and device based on block chain and collaborative synchronization
CN113554529A (en) Anti-electricity-stealing evidence-obtaining key data processing method, device and equipment
CN112364388A (en) Sensor data authentication method and device based on block chain
CN111625870A (en) Block chain based security audit method, system and storage medium
CN113868685A (en) Electric power monitoring data encryption storage system based on block chain
CN110830259A (en) Method and system for providing originality and integrity certification for multimedia data
CN115222410A (en) Block chain based transaction uplink method and device, electronic equipment and storage medium
CN111814201A (en) Network drone aircraft data recording method, device and system and electronic equipment
CN111612458A (en) Method and device for processing block chain data and readable storage medium
CN117395474B (en) Locally stored tamper-resistant video evidence obtaining and storing method and system
CN110969723A (en) Data management method, detection device, server, and computer-readable storage medium
CN114553532A (en) Data secure transmission method and device, electronic equipment and storage medium
CN112073418B (en) Encrypted flow detection method and device and computer readable storage medium
CN111611624A (en) Verification method and system for information point table file partition digital signature
CN116340918A (en) Full-secret-text face comparison method, device, equipment and storage medium
CN115001768A (en) Data interaction method, device and equipment based on block chain and storage medium
CN111654591B (en) Picture tamper-proof method, computer device and storage medium
CN113312640A (en) Software data integrity multi-party consensus method based on trusted computing
CN112579994A (en) Digital product content protection system and method based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211026